Try our new research platform with insights from 80,000+ expert users

Proofpoint Threat Response vs Splunk Security Essentials comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Proofpoint Threat Response
Ranking in Security Incident Response
3rd
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
No ranking in other categories
Splunk Security Essentials
Ranking in Security Incident Response
10th
Average Rating
8.6
Reviews Sentiment
5.9
Number of Reviews
4
Ranking in other categories
Data Visualization (18th), IT Alerting and Incident Management (14th)
 

Mindshare comparison

As of August 2025, in the Security Incident Response category, the mindshare of Proofpoint Threat Response is 17.1%, up from 8.8% compared to the previous year. The mindshare of Splunk Security Essentials is 1.8%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Incident Response
 

Featured Reviews

Giuseppe Sgroi - PeerSpot reviewer
Blocks potential spam emails efficiently and integrates well with our security framework
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails The platform's most valuable include the ability to check emails and block potential spam. The platform's technical support services and pricing need…
Srinivas Prudhivi Reddy - PeerSpot reviewer
Enables us to examine the parameters of the events found and take appropriate actions as necessary
Once we've configured our logs, for example, if we need to monitor processes and IP addresses, we ensure these logs are being ingested into our Splunk instance. The logs gathered from various endpoints are then consolidated into our Splunk platform. Once the data is collected, we can create searches and dashboards to analyze it. With these searches and dashboards, we gain insights into events and can make informed decisions based on them. We'll examine the parameters of these events and take appropriate actions as necessary.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Support is very responsive."
"The best part of Proofpoint Threat Response is the Auto-Pull feature. Being able to pull an email back from a user's mailbox is very useful, yet I have noticed that not a lot of organizations use this kind of feature."
"If something's pulled and then it's later declared a false positive, it will automatically restore. They also take automatic feeds from their advanced threat detection modules."
"It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so."
"The platform's most valuable include the ability to check emails and block potential spam."
"They have a good catalog of plans to use to resist the attacks."
"We are focusing on security to ensure incidents are reported efficiently. In addition to that, for reporting purposes, we are utilizing our dashboards or creating new ones. We will be using free visualization tools for this purpose."
"I would have to rate Splunk Security Essentials a 10 out of 10 because it's free and there's tons of usable content."
"The network monitoring feature is particularly valuable for gathering information about users, login times, and other statistics."
 

Cons

"If the reporting gets improved then it would be better, but the product is running amazing as it is."
"The platform's technical support services and pricing need improvement."
"Has some quirks."
"The on-premise version doesn't scale well for large companies."
"The interface within Threat Response could be made simpler."
"The price could be improved."
"They could add more AI content or AI and machine learning."
"The reporting feature needs to be more user-friendly."
 

Pricing and Cost Advice

"The way most big companies work with Proofpoint is that they try to tie everything into an enterprise license. I can't comment on the actual costs, however I do know that alternative solutions such as Abnormal Security can be much more expensive than Proofpoint Threat Response."
"It's quite affordable to have it with this much functionality and ease to administrate."
Information not available
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
865,484 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Healthcare Company
13%
Computer Software Company
11%
Energy/Utilities Company
11%
Financial Services Firm
11%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Proofpoint Threat Response?
I have a vague idea because I don't know what others are charging. But we felt that putting up with the pains and having to spend more time keeping it running than we expected is still better than ...
What needs improvement with Proofpoint Threat Response?
The platform's technical support services and pricing need improvement.
What is your primary use case for Proofpoint Threat Response?
We use the product to verify and manage emails sent and received through our Microsoft Exchange server, focusing on blocking potential spam emails.
What is your experience regarding pricing and costs for Splunk Security Essentials?
Our SecOps manager and CISO were more familiar with Splunk, and the price was right. That was probably the primary driver, and we did evaluation as well with strict criteria and Gartner ratings.
What needs improvement with Splunk Security Essentials?
I have not used Splunk Security Essentials' customizable dashboards. I have not taken advantage of the pre-built security use cases in Splunk.
What is your primary use case for Splunk Security Essentials?
We use Splunk Security Essentials. We have projects, though not many projects per year. The solution is used to resist cyber attacks. They have a good catalog of plans to use to resist the attacks.
 

Overview

 

Sample Customers

University of Waterloo, Akorn, Fenwick and West LLP
Information Not Available
Find out what your peers are saying about Proofpoint Threat Response vs. Splunk Security Essentials and other solutions. Updated: July 2025.
865,484 professionals have used our research since 2012.